What is an sql injection attack
What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…
What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…
This is a short tutorial showing how to setup wordpress and cloudflare flexible ssl. Cloudflare offer a service called 'flexible ssl' this means that cloudflare encrypts your content between the…
This is a sponsored post. I dont usually do sponsored posts, but this one is different (I’m getting a hat for drawing attention to this, and I think its worthwhile).…
This is a basic openvas tutorial for beginners. I will explain a little of how to use openvas web ui to perform a test of your systems. It will give…
This post will show you how to install phpcs and phpmd in sublime text on your mac: Following on from my post about using git and phpcs in brackets, I…
This post will show you how to mount a remote ssh filesystem as a 'drive' in osx using a bash script, osxfuse and brew. There are a few ways to…
Jonathan Mitchell Portfolio About Me I have a BSc in Electronic Engineering, and an MSc in Advanced Computer Systems Development with Distinction. I was awarded the University Court Medal for…
Oracle process overview. There are 3 types of oracle processes: USER processes SERVER processes BACKGROUND processes User connected to a user application (eg sql*plus) controls the application associated with an…
Oracle logical structures Oracle logical structures can be summarised by the following: Schema. Tablespace. Datablock. Redo log. Schema collection of objects (table, view, etc) owned by db user name is…